Tightened Database Security in c‑treeACE V10

Tightened Database Security in c‑treeACE V10

Posted By: David Faust

c‑treeACE has long offered many levels of security controlling database access. As applications have grown in complexity, so have security needs. SQL in particular provides highly granular control over rights and views. A summary of available c‑treeACE security measures:

User and group access rights. c‑treeACE mimics Unix concepts of user, group, and world level permissions regarding read, write, definition, and delete capabilities of files at the server level. This fine-grained control allows for securely defined data access by an administrator.

Authentication controls. In addition to requiring passwords for authentication, c‑treeACE has options to further control authentication and access:

Logon fail times – Set the number of invalid logon attempts.

Start and end dates – Specify, in advance, the date range a user is valid.

Must logon period – Specify an interval in which a user must log on at least once.

Logon lockout period – Specify a period until a failed logon can again attempt a logon.

Integration with LDAP and Unix Shadow password file support – Contact FairCom should you need centralized user and group management via these institutional defined protocols.

SQL View definitions. Views provide virtual depictions of your data. SQL Views are a great way to consolidate data for concise reporting using stored queries. Views can provide an additional layer of security as they restrict available data to users.

Advanced data encryption. Data can be encrypted via secure AES, 3DES, Blowfish and Twofish algorithms with minimal performance impact. It is strongly recommended to secure sensitive data with these options. Data encryption is available at a per-file level, including full support via SQL.

Tamper-proof configuration files. Configuration files can be encrypted preventing deployed applications from tampering with preset options. And, site-specific information can still be enabled as necessary.

File passwords. Individual passwords can be required at file open time, further restricting access to data at run time.

Transaction auditing history. When enabled, c‑treeACE transaction logs maintain a complete record of all database changes. An API is available providing access to this rich data history for auditing purposes.

Important V10 Security Compatibility Changes

Three important c‑treeACE V10 security enhancements will impact users when upgrading from prior versions. Two major changes were enabled forcing applications to rethink how they approach database security.

Backward client server compatibility between V10 and prior versions. Due to new authentication exchange protocols between client and server, V9 and prior clients are not able to connect to V10 servers. Likewise, V10 clients are notable to connect to V9 and prior servers. It is always recommended to use matching client – server versions when at all possible to obtain maximum feature usage and compatibility from c‑treeACE.

Guest access is now disallowed by default. Guest access allows for applications to not specify a user when connecting. Many application didn’t rely on c‑treeACE authentication controls, instead handling this at the application layer. However, a valid user name and password is now required to log into the server as the new default. This support can be disabled in your server configuration for backward compatibility. However, FairCom recommends applications be modified to use appropriate c‑treeACE user authentication and validate all server connections. Add the following keyword to revert this change if necessary:GUEST_LOGON YES

It is no longer possible for non-ADMIN users to back up or replicate data, or view information history from transaction logs. Dynamic dumps, transaction history, and replication connections now require ADMIN group membership. As these features can potentially expose information, these data access routes are now denied to all but ADMIN defined users. A method to revert this behavior is not available at this time. FairCom is investigating alternative user definitions allowing these activities. Contact FairCom should you have specific legacy applications impacted by this change.

Archives

Resources

SIGN UP FOR OUR NEWSLETTER

FairCom needs the contact information you provide to us to contact you about our products and services.
You may unsubscribe from these communications at anytime. For information on how to unsubscribe,
as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.